Arrow down
arrow down
Arrow down
Arrow down
Arrow down
white paper

Why Network Verification Requires A Mathematical Model

A mathematical model, as opposed to monitoring or testing live traffic, can perform exhaustive and definitive analysis of network designs and behavior.
Who should read?
What is covered in this content? Why is this content important?

Introduction

Network verification is a rapidly emerging technology that is a key part of Intent Based Networking. Verification of network designs can help avoid outages, facilitate compliance processes and accelerate change windows. Full-feature network verification solutions require an underlying mathematical model of network behavior to analyze and reason about policy objectives and network designs. A mathematical model, as opposed to monitoring or testing live traffic, can perform exhaustive and definitive analysis of network designs and behavior, including proving network isolation or security rules.

In this paper, we will describe how verification can be used in key IT processes and workflows, why a mathematical model is required and how it works, as well as example use cases from the Forward Enterprise platform. As multiple vendors now claim to have a mathematical model in their system, this will also clarify what requirements a mathematical model must meet and how to evaluate comparable products.

Network Verification: A Key Component of Intent Based Networking

Intent Based Networking (IBN) is one of the most interesting and significant trends in IT in recent years. The IBN vision grew out of the need for greater network automation following the partial success of Software Defined Networking (SDN) to simplify cloud deployments and virtual networking. As defined, IBN automates the design and configuration of networks, to align with administrators’ high-level intent, as well as the analysis and remediation of network errors.

Today, reasoning in software about the resulting behavior of a network from its design is a much more mature technology than recreating the intelligence to design and configure a network to achieve a specific policy objective. Nearly all IBN deployments today that succeed are focusing on the network verification process. The benefits are immediately tangible because many of these IT processes that verify a network design or change are extremely tedious and can reduce agility or delay network updates significantly.

IBN verification allows IT teams to automate the analysis of existing network paths end-to-end, based on the collected information from every network device and mathematically analyzing the behavior for all possible traffic flows at each hop. Traditional tools like ping and traceroute can confirm a path, but cannot verify all paths for all conditions, or confirm network isolation for all situations when required. Some examples of end-to-end behavior that IBN can easily verify:

  • Are there are least 2 redundant paths from a particular access layer switch to another site through an MPLS Core?
  • Are there any single points of failure along an entire network path?
  • Have we ensured logical traffic isolation between two tenants or applications for all non-management IP protocols?
  • Is traffic coming in from the external internet properly restricted to only specific destinations and services?
  • Are only specific services running in our Amazon cloud available from various internal sites, systems and users? If so, which ones?

Verification is a distinctly different methodology than traditional testing. Verification is reasoning based on an analysis of the network design, configurations and current network state. It does not look at live traffic flows or test scenarios to determine network activity. Verification can thus do something traditional testing can rarely do: “prove a negative”, by confirming that something can’t happen, such as two networks being unreachable through any path. IBN verification can also identify configuration errors like MTU mismatches, forwarding loops, or IP address duplication anywhere in the network, which may not show up in any specific test, and without reviewing devices one by one.

IBN verification is now fully capable of shifting the network IT model from a reactive approach, to a proactive approach where an automated analysis of current network designs can virtually eliminate human errors and misconfigurations. The automated intelligence that IBN offers is also helping to replicate the rare expertise of the critical IT engineers in diagnosing outages, documenting network requirements and verifying fixes.

Network Verification Automates Key IT Processes

The challenge with IBN systems is to codify network intelligence and analytical capabilities into a general-purpose platform for all traffic, devices and protocols. The problem becomes much easier and more realistic when the focus is narrowed to verifying that the existing network design is in alignment with specific policies. Intent based verification analyzes a series of high-level policy statements and requirements to verify that the network is correctly designed and configured to support them, and isolating changes when needed.

Verifying network designs and configurations manually can be tedious, time intensive and expensive, making it an excellent candidate for IT automation where possible. Since IT teams are now focused heavily on digital transformation and IT automation, the question naturally arises how intent based verification can support these efforts. Three primary areas are commonly addressed by IT organizations:

  1. Root cause analysis and accelerating trouble ticket resolution
  2. Compliance and audit-related processes
  3. Change window validation

Root-Cause Analysis and Remediation

When network issues arise unexpectedly, isolating the root-cause is often a challenge. For example, users and network admins can observe that a certain type of traffic flow between source and destination is down, but the specific device configurations or firewall rules that determine the current behavior are hard to isolate. Seemingly unrelated changes may have adverse impact to application flows and users in another part of the network.

IBN verification solutions can automate much of the root-cause analysis around anomalous traffic flows. A detailed analysis of the entire network that can quickly isolate what is preventing a particular flow or behavior can now be completed in a few minutes. IBN deployments are now seeing from 25-50% reduction in time and resources to resolve trouble tickets caused by configuration errors or unexpected changes in the operational state of network devices. In the case of large enterprise networks this can translate to thousands of hours per year.

Industry Recognition

Winner of over 20 industry awards, Forward Enterprise is the best-in-class network modeling software that customers trust

Most compliance checks and network audits require verifying key aspects of network behavior, making them prime candidates for process automation through IBN. IBN platforms can verify security policies, such as confirming specific subnets and tenants are isolated, or that all external application access is through HTTPS only. Fault-tolerance and path or device redundancy can also be quickly verified at a glance, with automated checks running each hour or each day, as needed.

IBN systems can also automate the search for a wide range of audit-related network health checks, which are difficult to find manually, such as:

  • Link speed mismatches
  • Maximum Transmission Unit (MTU) size mismatches
  • Forwarding loops
  • VLAN misconfiguration
  • Port channel inconsistencies

Compliance objectives are a natural fit for IBN verification where policy requirements can be specified. Audit-related processes can likely complete in a fraction of the time. To the extent that an IBN system can archive network snapshots and audit reports, organizations can easily track compliance results over time and compare to then-current differences in network design. This can give IT organizations a powerful tool to document, track and report on network behavior changes over time for the first time.

Change Window Validation and Post-Change Verification

Perhaps the most important times to verify network behavior and capabilities are both before and after a change window. Roughly one-third of all change windows fail because of faulty change procedures, unexpected network conditions, limited test ability or user error. Verifying all network capabilities in both scenarios will immediately expose if there is any adverse or unintended impact from a set of changes or upgrades. Changes always introduce risk into a running network, and unforeseen issues post-deployment frequently require roll-backs. Verifying changes prior to deployment can reduce these concerns measurably, as well as the time to get changes deployed.

Increasingly, large data center network updates are being rolled out by or in conjunction with automation and orchestration platforms. IBN verification solutions are now being deployed with these orchestration platforms to ensure that all processes are automated, and that they are implemented correctly with minimal human intervention.

What is a Mathematical Model of Network Behavior?

To reason about network behavior, a system needs a working model of the complete network, incorporating how each device responds to every possible packet and traffic flow. It is referred to as a mathematical or behavioral model of the network because each network device is modeled as a transformation function on a set of potential packets. The transformations are essentially algebraic or logical operations that, when analyzed end to end, can verify the complete network design and supported policies or behavior.

Let’s look at some of the mechanics of these mathematical operations to support network verification. As packets flow from server A to server B, each device in the network can either forward the packet on a particular port, drop the packet, or modify the packet header and forward. In the diagram below, original packet P is transformed to P’’ by the time it reaches server B.

Network diagram
Figure 1 – Packets from server A to B are modified at each hop in our network path. Understanding how each device can potentially modify and handle each generic packet is critical to reasoning about possible end-to-end network behavior.

In our mathematical model, we are going to create sets of packets that will have the same behavior at a particular device so that we can ultimately analyze all possible packets in a scalable, manageable way. For our purposes, we are only going to analyze the packet headers and not the data. Generic packet headers are modeled as a binary string, such as 10x1, where “x” can be either 0 or 1. So, “10x1” (an unrealistically short header used for example), would represent a set of two real packet headers: 1001 and 1011. A more realistic 20-byte header with 100 “x” bits could itself represent over 1030 real packet headers!

Network diagram figure 2
Figure 2 – To determine all the packets that reach server B from server A, we apply successive device transformation functions at each hop from the incoming flow. The results are the union of flows through boxes 2 and 4.

Each network device (switch, router, firewall, load balancer) is then modeled as a transformation
function on incoming generic packet headers. Transformations usually create multiple sets of transformed packets depending on how many operations and choices the device can make based on the incoming flow. Given an input packet with header h, on port p, the transformation function for a device could be represented as:

  • T:(h,p) {(h1,p1), … ,(hn,pn)}.

The generic packets coming in above result in n different possible results or transformations. Each subset is transformed similarly, with the same set of actions, and then passed to the next hop device in the model.

Every transformation function is a series of rules, in priority order that, when matched to the incoming packet header and port, triggers a series of actions on those packets. Actions may be to drop a range of packet headers, forward a different range to a specific port, or rewrite portions of the header string. For example, for a router with the following route table:

  • 172.24.74.x Port 1
  • 172.24.96.x Port 2
  • 172.67.x.x Port 3

The transfer function, which is breaking up the initial set of incoming packet to three sets of outbound packets, without modifying the header, could be represented by:

  • (h,1) if dst_ip(h) = 172.24.74.x
  • T:(h,p) (rw_mac(dec_ttl(h), next_mac), 2) if dst_ip(h) = 172.24.96.x
  • (rw_mac(dec_ttl(h), next_mac), 3) if dst_ip(h) = 172.67.x.x

In the above example, dec_ttl and rw_mac are software functions that decrements TTL in the header, and rewrite the MAC address for the next hop. Rule tables for each device are created from our collection and analysis of the device’s configuration files and state tables at the time of the snapshot.

Our mathematical model of device transformations is a series of algebraic and logic operations on sets of packets represented by binary header strings. Based on a finite number of possible transformations and a limited partitioning of subsets at each device, we are able to then accurately analyze and determine the behavior of all possible packets that could traverse all network paths. Without a mathematical model and underlying algebraic model based on set theory, including the accurate modeling of each device based on configuration data, such an exhaustive analysis could not possibly be accomplished.

Despite all of this mathematical simplification, scalability is still a crucial design objective. One Forward Networks customer, a large payment processor, has a network of over 3,000 devices which translates into over six-octillion (6x1024) viable network paths. Even with such an overwhelming number of paths to analyze, they are able to quickly check whether any of the paths do not conform to stated policies, and to determine the root cause of security or network compliance issues.

The key to a manageable user experience is to perform policy-driven queries that narrow down the scope of any analysis. It may not be viable to report on all possible paths through the network from all source addresses at once, but we can certainly build queries across the network such as:

  • What are all the paths from server A to server B? (see figure 2)
  • What are all the destinations from device A (figure 3)
  • Are two network zones logically isolated for all protocols but SSH?
  • Can any traffic reach a secure zone that bypasses a particular firewall?

Each of these specific queries serves to reduce our analytical space that can be resolved quickly. Despite there being more than six octillion paths in the network, these queries complete in only a few seconds!

To complete this section, let’s look at a specific example query. The generic packet header can be formed from the details of the query, which is used as input to the transformation functions for our current network design. How the results are displayed in the Forward Enterprise platform will be shown in later sections.

In subsequent sections, we will look at Forward Networks applications and user interfaces, how they leverage this mathematical model to automate analytical processes, and help guide and simplify the user experience.

Search Query: What are all the reachable destinations from device A?

Network Que Diagram
Figure 3 – To determine all the reachable destinations from Device A, we create a generic packet header that fixes the source MAC and IP bits and genericizes the possible destination addresses, and then moves the generic packet header through the network model of device transformations relevant to the source device.

Customers are unanimous:
Forward Enterprise is a game-changer

From Fortune 50 institutions to top level federal agencies, users agree that Forward Enterprise is unlike any other network modeling software

Powerful Applications Built on the Mathematical Model in Forward Enterprise

The mathematical model forms the deep analytical engine of the Forward Platform. It would not be useful without turnkey applications for network administrators to build their queries that mirrored their actual verification processes and presented the results in an intuitive and actionable fashion. Forward Enterprise has captured a few of the key IT processes that verification accelerates and built complete applications for each use case. We call these use applications or use cases:

  • Search (Root-cause analysis and remediation)
  • Verify (Validate network designs and proposed updates)
  • Predict (Analyze the impact of changes to ACL rules and NAT policies)
  • Compare (Analyze changes in configurations and behavior between two points in time)
Search

The Search application in Forward Enterprise allows users to structure queries about the behavior of the current network design, for example, is a particular traffic pattern allowed or specifically denied? Search queries can be built with a structured syntax that guides users to specify policy details and traffic parameters easily based on well-known concepts in IP networking.

Search is frequently used to remediate network issues to determine if the network is the root cause, and if so, where the configuration error can be isolated. It is easy to incrementally refine a search query or expand it to probe down into the network behavior and isolate issues.

Search queries can start from very broad concepts, such as looking for all devices on a particular VLAN or those supporting multi-cast, to very detailed end-to-end policy behaviors as shown in the diagram below with a specific source and destination and through specific devices.

The mathematical model is leveraged to translate the traffic query into the appropriate set of generic packet headers to forward through the network model. The results of the query, usually a listing of viable paths that meet the search criteria, are displayed on the topology diagram.

Forward Enterprise search query diagram
Figure 4 – The search query can be built from modular IP terms and concepts, including source and destination IP, protocols, through devices, delivery status, ports used, etc. A path that supports the search query is displayed within the topology map.
Verify

The Verify feature is the sum results of all prior saved search queries that are re-checked as needed, usually each time a change is made within the network model. Prior searches are saved into a dashboard that shows the current pass/fail status of each of these saved queries.

For example, if it’s a requirement that two edge devices in different data centers are always reachable through multiple redundant paths, that would be saved as a verification check and re-run after every change or update to the network.

The screen (Fig. 5, below) shows the results of a number of saved verification checks on a dashboard that can be filtered by pass/fail status or note text.

Forward Enterprise network verification
Figure 5 – The Verify screen shows the results of pre-defined policy checks (intent) customized for an enterprise network. Selecting the pass or fail links allows users to quickly drill down to the root cause and potential configuration changes that need to be made.
Predict

Frequently, administrators want to know how a potential change will impact the network prior to pushing to the live network. While Search and Verify are analyzing a snapshot pulled from the network, Predict allows changes to be made, tested and compared within the working software model. Today, Predict supports changes to ACL and NAT rules.

Changes to current configuration files are made within the safe sandbox of the Forward Platform and then any search query or verification check can be re-run against the updated model. Comparison of all verification checks can be made side by side against the current network configuration and state information with the proposed changes implemented to fully evaluate before and after change effects.

Figure 6 shows the highlighted lines of configuration code for a set of ACL rules on a particular firewall that we can edit and re-verify within our environment. Without reading through lines of code, the effect of the ACL rules is easily seen in the highlighted column below.

Forward Enterprise Predict
Figure 6 – Make changes to current ACL and NAT configuration files and anticipate changes in network behavior
Compare

Just as Predict can show verification results side by side with current configurations and proposed changes, the Compare feature can compare results and differences between any two snapshots in time. Compare network behavior between today and a month ago prior to issues surfacing to quickly isolate errors. Or show the effects of rolling back changes to any prior network snapshot.

The mathematical model and the snapshot collector provide immediate documentation and analysis of behaviors at any point in time which can be easily archived for future analysis and comparison. Figures 7 and 8 show a comparison between two snapshots, before and after deploying a new edge firewall. Verification checks are re-rerun and compared side by side (figure 7), as well as showing all the new routes that resulted in the network, or routes that were updated to different hops (figure 8).

Forward Enterprise compare policy checks interface
Figure 7 – Compare policy checks side by side between any two network snapshots in time. In this case, key policy requirements are now passing in the “After” snapshot as a result of a change.
Forward Enterprise IP route change table
Figure 8 – IP route changes within the network as a result of adding our new device are shown in the above screen capture.

Summary

Intent-based verification is a rapidly emerging technology to ensure that network implementations are aligned with intended policies and requirements. Verification requires an exhaustive analysis of all conceivable packet flows and traffic patterns, which is unrealistic in traditional testing methodologies or evaluating live traffic. A mathematical model that treats every network device as a set of algebraic and logical operations on a large set of packets can now evaluate any and all possible scenarios for a more thorough verification, as well as help isolate the root cause of any behavior issue.

    The keys for a successful solution are:

  1. Accurate modeling of all network devices, from layers 2 through 4, across all major network vendors and operating systems
  2. Scalability in terms of collecting network details from a large number of devices and analyzing or verifying large networks in real-time with a satisfactory user experience
  3. Powerful turnkey applications on top of the mathematical model that mirror key IT processes and workflows for remediation, network updates, analysis and verification

Forward Enterprise is the first such highly scalable, multi-vendor network verification solution available today. The sophistication and scale of its mathematical model allows for completely new analytical and verification features compared to existing network management, monitoring or analysis solutions. The automation of key IT processes for remediation, analysis and change verification makes it an ideal solution to complement any network automation project and to return an immediate ROI to large enterprise organizations by reducing manual IT efforts and reducing the risk of network outages.

Most Recent

Browse all posts
Top cross